The Erratic Handler and DOROTHY Approach Overview An existing robot handler for the Fluke robots was altered to communicate with Videre’s Erratic robot.

Slides:



Advertisements
Similar presentations
10 september 2002 A.Broersen Developing a Virtual Piano Playing Environment By combining distributed functionality among independent Agents.
Advertisements

1 Distribution of Data and Remote Invocation of Programs Tomasz Müldner, Zhonghai Luo and Elhadi Shakshuki* Jodrey School of Computer Science, Acadia University,
A LabVIEW-based soundcard interface for e-laboratory Ţepelea Laviniu 1, Gavriluţ Ioan 1, Neamţu Ovidiu 1, Gergely Eugen 1, Gacsádi Alexandru 1 1 University.
This presentation and its materials are based upon work supported by the National Science Foundation under Cooperative Agreement Number HRD Any.
The Internet Useful Definitions and Concepts About the Internet.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Component Description Alice 3d Graphics Software Human Computer Interaction Institute Carnegie Mellon University Prepared by: Randy Pausch,
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Funded by a grant from the National Science Foundation. Any opinions, findings, conclusions or recommendations expressed are those of the authors and do.
Research Proposal Presentation, June 21, 2011: David South and Mary Shuman Integration of a Graphics-Based Programming Tool with Robotics to Stimulate.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Remote access and file transfer Getting files on and off Bio-Linux.
A Billiards Point of Sale Application Christopher Ulmer CS 470 Final Presentation.
EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Approach Overview Using Dorothy, an enhanced version of the Alice 2.0 source code, and a Scribbler robot, it is our aim to increase interest in computer.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Customized cloud platform for computing on your terms !
OnTimeMeasure Integration with Gush Prasad Calyam, Ph.D. (PI) Tony Zhu (Software Programmer) Alex Berryman (REU Student) GEC10 Selected.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Decision-Making on Robots Using POMDPs and Answer Set Programming Introduction Robots are an integral part of many sectors such as medicine, disaster rescue.
Remote Control of a Furby Toy with Bluetooth
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Simulation of Fault Detection for Robot Applications Chase Baker, Taeghyun Kang, Michael Shin Ph.D. Interaction with robot applications are becoming increasingly.
USING AN INTEGRATED 3D AND ROBOTICS ENVIRONMENT TO TEACH COMPUTATIONAL THINKING EFFECTIVELY Stephanie Graham Shiloh Huff Sabyne Peeler * This research.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Through the development of advanced middleware, Grid computing has evolved to a mature technology in which scientists and researchers can leverage to gain.
CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald.
Stereo Object Detection and Tracking Using Clustering and Bayesian Filtering Texas Tech University 2011 NSF Research Experiences for Undergraduates Site.
PREOP (Providing Robotic Experiences Through Object-Based Programming) By James Davis, Briana Wellman, Michael Raines, Monica Anderson The University of.
A Study of Wireless Virtual Network Computing Kiran Erra.
CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Dorothy Communication Dorothy Interface Robot Sensors Scribbler Robot(IPRE, 2010) Handler connection Background Dorothy, is a 3D/robotics programming environment.
Communication with Handler Approach Overview Alice 2.0 source code was modified to release event information to a robot handler component using sockets.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
System integration of WAP and SMS for home network system Editor : Chi-Hsiang Wu, Rong-Hong Jan School : the National Chiao Tung University Source : Computer.
1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,
Hybrid-Structure Robot Design From the authors of Chang Gung University and Metal Industries R&D Center, Taiwan.
Jini Architecture Introduction System Overview An Example.
1 Management of Distributed Data Tomasz Müldner, Elhadi Shakshuki*, Zhonghai Luo and Michael Powell Jodrey School of Computer Science, Acadia University,
Unix Machine In Computer Science for Teaching Cliff Zou Spring 2015.
Updated September 2011 Medical Applications in Nanotechnology Nano Gold Sensors Lab.
Nir Mendel, Yuval Pick & Ilya Roginsky Advisor: Prof. Ronen Brafman
Ryan Rasmussen Maggie Krause Jiajun Yang. Hardware Progress Mechanical assembly complete Received APM case and power module last week Connected wi-fi.
1 Standard Onboard Data Handling Architecture Based On SpaceWire Takahiro Yamada and Tadayuki Takahashi (JAXA/ISAS) November 2008 International SpaceWire.
Prototyping Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings.
Application of Stereo Vision in Tracking *This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations.
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Virtual Network Computing Sangmi Lee Oct,25,2000 Florida State University.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
VMware ESX and ESXi Module 3.
NXT Robots and their Applications in Machine Learning Group 2: Roanne Manzano, Eric Tsai, Jacob Robison Mentor: Anjum Gupta Faculty Advisors: Professor.
A Study of Wireless Virtual Network Computing
Tools and Services Workshop Overview of Atmosphere
Outline Overview Development Tools
Title of session For Event Plus Presenters 12/5/2018.
BlackBoard 5 A Definitive e-Learning Software Platform Ozgur Balsoy,
Using and Building Infrastructure Clouds for Science
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Project Title: I. Research Overview and Outcome
Presentation transcript:

The Erratic Handler and DOROTHY Approach Overview An existing robot handler for the Fluke robots was altered to communicate with Videre’s Erratic robot platform. An ErraticRobot object was programmed in Python in order to connect and send commands to the robot. The Paramiko Python module was used to create a remote connection to the robot. When the DOROTHY program sends movement commands to the Erratic handler, they are translated into keyboard commands used by the Robot Operating System (ROS). Creating a Stimulating 3D Programing Environment by Integrating Complex Robot Types Sabyne Peeler, Florida A & M University Sarah Rainge, Shiqi Zhang, Mohan Sridharan, Susan Urban, Joseph Urban Using Paramiko Paramiko is a Python module used to create secure connections to remote machines by implementing SSH2 protocol. It uses the IP address, username, and password to create an SSH client that can be used to send commands to the robot’s onboard PC. Paramiko methods are used to create an SSH client and channel where the ROS process necessary to send keyboard commands is started. This method can be used to integrate other robots that can be controlled through an SSH client. Motivation and Objectives Design of Robotic-Oriented Thinking to Help Youth, or DOROTHY, extends an existing interface between Alice and Fluke robots. While simple robots are easy to integrate and are widely used to teach basic programming concepts, their limited capabilities constrain the way in which the virtual 3D environment can mimic the real world. Integrating complex abilities can stimulate interest in Computer Science by demonstrating the use of robots in the real world. Objective: of this project is to create a more stimulating environment in DOROTHY by integrating complex robots. Related Work Alice (2009) Alice, Dann (2008) Dann, W., Cooper, S., and Pausch, R.. Learning to Program with Alice (2nd Edition), Prentice-Hall, Paramiko (2011) Paramiko, ROS (2011) ROS, Wellman (2009) Wellman, B., Anderson, M, Vrbsky, S. “PREOP as a Tool to Increase Student Retention in CS” Erratic RobotErraticRobot() Acknowledgements This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of NSF. The ErraticRobot Object The ErraticRobot object is initialized as a part of the ErraticHandler class. Contains move and turn methods that take in direction and amount variables sent from DOROTHY. This object also has a close method to close the connection to the robot when the program is done running. Methods can be added to this object to handle laser and imaging capabilities of the robot. Results Commands from DOROTHY are translated and sent to the Erratic robot in real time. Challenges 1. Communication between the Erratic handler and ROS modules. 2. Enabling the robot to react to commands in real time. Future Work Integrate mapping and imaging capabilities into the 3D virtual world. Integrate different types of robots. Use DOROTHY as a tool to teach computing and stimulate interest in Computer Science. Service Nodes and Erratic Handler (left) and Corresponding DOROTHY pseudo-code (right) Texas Tech University 2012 REU Program